In the Shadows We Trust: A Secure Aggregation Tolerant Watermark for Data Streams

被引:0
|
作者
Panah, Arezou Soltani [1 ]
van Schyndel, Ron [1 ]
Sellis, Timos [1 ]
Bertino, Elisa [2 ]
机构
[1] RMIT Univ, Dept Comp Sci & IT, Melbourne, Vic 3000, Australia
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47906 USA
关键词
digital watermarking; data integrity; data provenance; data aggregation; spread spectrum; pseudo-random codes; CDMA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In many applications such as sensor networks, e-healthcare and environmental monitoring, data is continuously streamed and combined from multiple resources in order to make decisions based on the aggregated data streams. One major concern in these applications is assuring high trustworthiness of the aggregated data stream for correct decision-making. For example, an adversary may compromise a few data-sources and introduce false data into the aggregated data-stream and cause catastrophic consequences. In this work, we propose a novel method for verifying data integrity by embedding several signature codes within data streams known as digital watermarking. Therefore, the integrity of the data streams can be verified by decoding the embedded signatures even as the data go through multiple stages of aggregation process. Although the idea of secure data aggregation based on digital watermarking has been explored before, we aim to improve the efficiency of the scheme by examining several signature codes that could also decrease the watermark detection complexity. This is achieved by simultaneous embedding of several shifted watermark patterns into aggregated data stream, such that the contribution of each data-source is hidden in the relative shifts of the patterns. We, also, derive conditions to preserve the main statistical properties of data-streams prior to the embedding procedure. Therefore, we can guarantee that the embedding procedure does not compromise the usability of data streams for any operations that depends on these statistical characteristics. The simulation results show that the embedded watermarks can successfully be recovered with high confidence if proper hiding codes are chosen.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Efficient and Secure Quantile Aggregation of Private Data Streams
    Lan, Xiao
    Jin, Hongjian
    Guo, Hui
    Wang, Xiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3058 - 3073
  • [2] A Secure Data Aggregation Algorithm Based on a Trust Mechanism
    Liu, Changtao
    Ye, Jun
    SENSORS, 2024, 24 (13)
  • [3] A Trust Secure Data Aggregation Model with Multiple Attributes for WSNs
    Li, Zhaowei
    Dang, Na
    Ma, Wenshuo
    Liu, Xiaowu
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 526 - 534
  • [4] Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach
    Zhang, Wei
    Liu, Yonghe
    Das, Sajal K.
    De, Pradip
    PERVASIVE AND MOBILE COMPUTING, 2008, 4 (05) : 658 - 680
  • [5] Secure Data Aggregation Algorithm Based on Trust in Wireless Sensor Networks
    Guo, Rui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 809 - 813
  • [6] A Novel Trust-Based Secure Data Aggregation for Internet of Things
    Liu, Yanbing
    Gong, Xuehong
    Xing, Congcong
    2014 PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2014), 2014, : 435 - 439
  • [7] Towards an asynchronous aggregation-capable watermark for end-to-end protection of big data streams
    Panah, Arezou Soltani
    van Schyndel, Ron
    Sellis, Timos
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 288 - 304
  • [8] An Algorithm of Trust-based Secure Data Aggregation for Wireless Sensor Networks
    Ye Z.-W.
    Wen T.
    Liu Z.-Y.
    Fu C.-G.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (06): : 789 - 794
  • [9] A Secure Data Aggregation Algorithm Based on Behavior Trust in Wireless Sensor Networks
    Zhou, Ming-Zheng
    Xu, Jin-Sheng
    Zhu, Cheng
    SEC 2008: PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING, 2008, : 61 - 66
  • [10] TOLERANT COATINGS IN RUST WE TRUST
    WINDSOR, B
    JOURNAL OF THE OIL & COLOUR CHEMISTS ASSOCIATION, 1988, 71 (04): : 103 - 105